<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Token-Leak — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/token-leak/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 04:16:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/token-leak/feed.xml" rel="self" type="application/rss+xml"/><item><title>Vault Token Leak via Authorization Header Forwarding</title><link>https://feed.craftedsignal.io/briefs/2026-04-vault-token-leak/</link><pubDate>Fri, 17 Apr 2026 04:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vault-token-leak/</guid><description>Vault instances configured to pass through the 'Authorization' header may forward Vault tokens to auth plugin backends when the header is used for authentication, potentially leading to token compromise; this vulnerability is tracked as CVE-2026-4525 and patched in versions 2.0.0, 1.21.5, 1.20.10, and 1.19.16.</description><content:encoded><![CDATA[<p>CVE-2026-4525 describes a vulnerability in HashiCorp Vault where an improperly sanitized &ldquo;Authorization&rdquo; header can lead to token exposure. Specifically, if a Vault auth mount is configured to pass through the &ldquo;Authorization&rdquo; header, and that header is used to authenticate with Vault, the Vault token itself is inadvertently forwarded to the auth plugin backend. This unintended token forwarding could allow malicious actors to gain unauthorized access if they can intercept or control the auth plugin backend. This issue affects Vault versions prior to 2.0.0, 1.21.5, 1.20.10, and 1.19.16 and was reported by HashiCorp. The vulnerability was patched in the aforementioned versions. Exploitation would require specific Vault configuration and the ability to influence the authentication process via the Authorization header.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Vault instance with an auth mount configured to pass through the &ldquo;Authorization&rdquo; header.</li>
<li>The attacker crafts a malicious request to Vault, including a valid &ldquo;Authorization&rdquo; header for authentication purposes.</li>
<li>Vault processes the request and, due to the vulnerability, forwards the Vault token contained in the &ldquo;Authorization&rdquo; header to the configured auth plugin backend.</li>
<li>The attacker intercepts the forwarded Vault token, either by compromising the auth plugin backend or through network monitoring.</li>
<li>The attacker uses the stolen Vault token to authenticate directly to Vault, bypassing normal authentication procedures.</li>
<li>The attacker gains unauthorized access to sensitive data and secrets stored within Vault.</li>
<li>The attacker escalates privileges within the Vault environment by leveraging the compromised token&rsquo;s permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4525 allows an attacker to steal Vault tokens, potentially granting them complete control over the Vault instance and access to all stored secrets. The severity is high due to the potential for complete compromise of sensitive data. The impact depends on the scope of secrets managed by the compromised Vault instance; in some cases, this could lead to a complete breach of the affected organization&rsquo;s infrastructure. The vulnerability affects all organizations using vulnerable versions of Vault with auth mounts configured to pass through the &ldquo;Authorization&rdquo; header.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vault instances to versions 2.0.0, 1.21.5, 1.20.10, or 1.19.16 or later to remediate CVE-2026-4525.</li>
<li>Review Vault auth mount configurations to ensure that the &ldquo;Authorization&rdquo; header is not being passed through unnecessarily.</li>
<li>Monitor network traffic for unauthorized access attempts using stolen Vault tokens after applying the patch.</li>
<li>Implement the provided Sigma rule targeting the usage of specific auth paths after a potential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vault</category><category>token-leak</category><category>authorization</category><category>cve-2026-4525</category></item><item><title>Kyverno Service Account Token Leak via API Call</title><link>https://feed.craftedsignal.io/briefs/2026-04-kyverno-token-leak/</link><pubDate>Tue, 14 Apr 2026 20:09:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kyverno-token-leak/</guid><description>Kyverno's apiCall serviceCall helper implicitly injects the Kyverno controller service account token into requests when policies lack an explicit Authorization header, allowing exfiltration to attacker-controlled endpoints and unauthorized actions.</description><content:encoded><![CDATA[<p>A vulnerability exists in Kyverno versions prior to 1.17.0 where the <code>apiCall</code> and <code>serviceCall</code> helpers automatically inject the Kyverno controller&rsquo;s service account token into outgoing requests. This occurs when a Kyverno policy does not explicitly define an <code>Authorization</code> header for the request. Because the destination URL for these API calls is policy-controlled via <code>context.apiCall.service.url</code>, a malicious actor could create or modify a <code>ClusterPolicy</code> or <code>GlobalContextEntry</code> to direct these requests—and thus the service account token—to an attacker-controlled endpoint. This vulnerability allows for token exfiltration and subsequent unauthorized actions, depending on the RBAC permissions granted to the Kyverno service account. This issue is limited to <code>ClusterPolicy</code> and global context usage, as namespaced policies are blocked from <code>servicecall</code> usage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains the ability to create or modify <code>ClusterPolicy</code> objects, potentially by compromising a GitOps repository or controller managing Kyverno policies.</li>
<li>Attacker crafts a malicious <code>ClusterPolicy</code> that uses the <code>apiCall</code> or <code>serviceCall</code> feature.</li>
<li>The policy specifies a URL for the <code>context.apiCall.service.url</code> that points to an attacker-controlled endpoint designed to capture the incoming request.</li>
<li>The crafted policy does not define an explicit <code>Authorization</code> header for the <code>apiCall</code> or <code>serviceCall</code>.</li>
<li>When the policy is triggered, Kyverno&rsquo;s <code>executor.addHTTPHeaders</code> function detects the missing <code>Authorization</code> header.</li>
<li>Kyverno reads the service account token from <code>/var/run/secrets/kubernetes.io/serviceaccount/token</code>.</li>
<li>Kyverno injects the service account token into the request header as <code>Authorization: Bearer &lt;token&gt;</code>.</li>
<li>The request, including the Kyverno service account token, is sent to the attacker-controlled endpoint, allowing the attacker to exfiltrate the token.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in the exfiltration of the Kyverno controller service account token. The severity of the impact depends on the RBAC roles and permissions assigned to the Kyverno service account within the Kubernetes cluster. With the stolen token, an attacker can perform any action that the Kyverno service account is authorized to perform, potentially leading to cluster-wide compromise, data breaches, or denial-of-service conditions. The number of affected clusters would depend on the number of Kyverno deployments using vulnerable versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Kyverno to version 1.17.0 or later to patch the vulnerability (go/github.com/kyverno/kyverno).</li>
<li>Implement monitoring to detect modifications to <code>ClusterPolicy</code> resources, especially those utilizing <code>apiCall</code> or <code>serviceCall</code> to arbitrary URLs, to quickly identify potentially malicious policy changes.</li>
<li>Deploy the provided Sigma rule to detect unexpected outbound network connections from the Kyverno pod that may indicate token exfiltration.</li>
<li>As a workaround, set explicit <code>Authorization</code> headers in all <code>apiCall</code> and <code>serviceCall</code> policies to prevent the implicit token injection (see workarounds).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kyverno</category><category>token-leak</category><category>cloud</category></item></channel></rss>